30 relations: Byte, Central processing unit, Common Vulnerabilities and Exposures, Copy-on-write, Cyrix coma bug, Data loss, Denial-of-service attack, Dr. Dobb's Journal, Exception handling, Halt and Catch Fire, Hexadecimal, Instruction set architecture, Intel, Linearizability, Meltdown (security vulnerability), Operating system, P5 (microarchitecture), Page cache, PDF, Pentium, Pentium FDIV bug, Pentium OverDrive, Processor register, Protection ring, Software bug, Spectre (security vulnerability), Stepping level, Workaround, X86, X86-64.
The byte is a unit of digital information that most commonly consists of eight bits, representing a binary number.
A central processing unit (CPU) is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions.
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures.
Copy-on-write (CoW or COW), sometimes referred to as implicit sharing or shadowing, is a resource-management technique used in computer programming to efficiently implement a "duplicate" or "copy" operation on modifiable resources.
The Cyrix coma bug is a design flaw in Cyrix 6x86, 6x86L, and early 6x86MX processors that allows a non-privileged program to hang the computer.
Data loss is an error condition in information systems in which information is destroyed by failures or neglect in storage, transmission, or processing.
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
Exception handling is the process of responding to the occurrence, during computation, of exceptions – anomalous or exceptional conditions requiring special processing – often changing the normal flow of program execution.
In computer engineering, Halt and Catch Fire, known by the assembly mnemonic HCF, is an idiom referring to a computer machine code instruction that causes the computer's central processing unit (CPU) to cease meaningful operation, typically requiring a restart of the computer.
In mathematics and computing, hexadecimal (also base, or hex) is a positional numeral system with a radix, or base, of 16.
An instruction set architecture (ISA) is an abstract model of a computer.
Intel Corporation (stylized as intel) is an American multinational corporation and technology company headquartered in Santa Clara, California, in the Silicon Valley.
In concurrent programming, an operation (or set of operations) is atomic, linearizable, indivisible or uninterruptible if it appears to the rest of the system to occur at once without being interrupted.
Meltdown is a hardware vulnerability affecting Intel x86 microprocessors, IBM POWER processors, and some ARM-based microprocessors.
An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.
The first Pentium microprocessor was introduced by Intel on March 22, 1993.
In computing, a page cache, sometimes also called disk cache, is a transparent cache for the pages originating from a secondary storage device such as a hard disk drive (HDD).
The Portable Document Format (PDF) is a file format developed in the 1990s to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems.
Pentium is a brand used for a series of x86 architecture-compatible microprocessors produced by Intel since 1993.
The Pentium FDIV bug was a computer bug that affected the floating point unit (FPU) of the early Intel Pentium processors.
The Pentium OverDrive was a microprocessor marketing brand name used by Intel, to cover a variety of consumer upgrade products sold in the mid-1990s.
In computer architecture, a processor register is a quickly accessible location available to a computer's central processing unit (CPU).
In computer science, hierarchical protection domains, often called protection rings, are mechanisms to protect data and functionality from faults (by improving fault tolerance) and malicious behaviour (by providing computer security).
A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.
Spectre is a vulnerability that affects modern microprocessors that perform branch prediction.
The term stepping level or revision level in the context of CPU architecture or integrated circuit is a version number.
A workaround is a bypass of a recognized problem or limitation in a system.
x86 is a family of backward-compatible instruction set architectures based on the Intel 8086 CPU and its Intel 8088 variant.
x86-64 (also known as x64, x86_64, AMD64 and Intel 64) is the 64-bit version of the x86 instruction set.